Available online at ScienceDirect. Procedia Engineering 78 (2014 )

Size: px
Start display at page:

Download "Available online at ScienceDirect. Procedia Engineering 78 (2014 )"

Transcription

1 Available online at ScienceDirect Procedia Engineering 78 (2014 ) Humanitarian Technology: Science, Systems and Global Impact 2014, HumTech2014 Algorithm for source mobile identification and deactivation in SMS triggered improvised explosive devices Francis Enejo Idachaba* Covenant University Ota. Ogun State Nigeria Abstract Mobile communication technology can be used for the activation of explosive devices from more remote locations using the short messaging system. The platform eliminates the need for the detonator to be near the Improvised Explosive Devices. It eliminates the need for line of sight between the transmitter and the receiver and can also be used to activate multiple IEDs from one location with one message. This paper presents the development of an algorithm for the minimization or delayed activation of suspected SMS triggered explosive device. It will also enable the detection of GSM enabled IEDs before they are activated and the localization of the source mobile for the trigger SMS in real-time with a possibility of stopping the delivery of such suspected SMS trigger messages Elsevier The Authors. Ltd. This Published an open by Elsevier access article Ltd. under the CC BY-NC-ND license ( Selection and peer-review under responsibility of the Organizing Committee of HumTech2014. Selection and peer-review under responsibility of the Organizing Committee of HumTech2014 Keywords: Detonation; Explosive devices; Mobile Communication; Short Messaging System 1. Introduction Mobile communication technology provides a platform for communication between mobile devices located within the coverage area of the base station antennas. To maximize the available frequencies, the geographical area covered by the antenna is broken down into cells where the frequencies are reused depending on the communication technology and the population/ traffic density in those locations. Figure 1 shows the architecture of a mobile communication network. The mobile communication architecture provides a platform that can be utilized for the activation of multiple IEDs located in different geographical location from one source mobile located in another * Corresponding author. address: idachabafe@yahoo.com Elsevier Ltd. This is an open access article under the CC BY-NC-ND license ( Selection and peer-review under responsibility of the Organizing Committee of HumTech2014 doi: /j.proeng

2 Francis Enejo Idachaba / Procedia Engineering 78 ( 2014 ) location. These mobile devices can be located on different continents thus making the detection and tracking of the trigger/source mobile impossible. Nomenclature BTS Base Transceiver Station SMS Short Message Service HLR Home Location Register VLR Visitor Location Register 1.1. Mobile Communication Technology There are two dominant mobile communication technologies and they have evolved over the years into different generations. These technologies are the Global System of Mobile communication (GSM) and the Code Division Multiple Access (CDMA) systems. This paper focuses on the GSM technology due to it wide spread deployment. Fig. 1. GSM Mobile Communication Architecture The GSM architecture consists of a Base Transceiver Station (BTS) connected to a Mobile Switching Center through the Base Station Controller. The details of the mobile unit and the owner details are stored in the HLR and VLR databases while the Gateway MSC (GMSC) provides links to other operator networks.[1][2][3] 1.2. Short Messaging Service Short Messaging Service (SMS) is a very significant service delivered by mobile communication networks. It involves the transmission of alphanumeric characters (160 characters in length) from a source mobile to a receiving mobile. The SMS can be sent from one mobile to one receiving mobile or from one mobile to multiple receiving mobiles at the same time. The SMS is sent from the originating mobile and it goes through the operator network to the SMS center. An SMS center (SMSC) is responsible for handling the SMS operations of a wireless network. An SMS message may need to pass through more than one network entity (e.g. SMSC and SMS gateway) before reaching the destination. The main duty of an SMSC is to route SMS messages and regulate the process. If the recipient is unavailable or the phone is switched off, the SMSC will store the SMS message. The SMS will be forwarded to the recipient whenever it becomes available. SMSC are usually dedicated to handle the SMS traffic of one wireless network with each operator managing their own but it is possible for a network operator to use a third-

3 98 Francis Enejo Idachaba / Procedia Engineering 78 ( 2014 ) party SMSC that is located outside their wireless network system. The typical SMS network architecture in Figure 2 shows the SMS center and the different databases of the network. These databases are the Home Location Register (HLR) and the Visitor Location Register (VLR). The SMSC uses these data to locate the mobile unit and forwards the messages through the MSC and base station to the destination mobile SMS Message Delivery Process The SMS message delivery process is shown in Figure 3. Fig. 2. SMS Architecture Fig. 3. SMS delivery process 1. The MS transfers the SM to the MSC. 2. The MSC interrogates the home SMSC to verify that the message transfer does not violate the supplementary services invoked or the restrictions imposed. The MSC sends the short message to the home SMSC using the SMSPP Invoke operation 3. The SMSC delivers an acknowledgment to the MSC. 4. The MSC returns order release to the MS. 5. The SMSC queries the HLR for the location of the destination MS. 6. The HLR returns the destination (MSC) serving the destination MS. 7. The SMSC delivers SM to the MSC serving the destination MS. 8. The SMSC delivers the short message to the MS. 9. The MS acknowledges to the MSC the successful outcome of the SMSDPP operation. 10. The MSC returns to the SMSC the outcome of the MO-SM operation (delivery successful) 2. SMS based Control The combination of the GSM/ Mobile communication technology and the microcontrollers created a new field of remote control where control signals are sent over the communication network in the form of SMS messages. The control messages are received by the receiving mobile and sent to the microcontroller which decodes the messages and activates the relevant switches for controlling the devices[4][5][6][7][8]. A block diagram of this control network is shown in Figure 4. Communication Modem Microcontroller Relays and Switches Device Fig. 4. SMS based remote control architecture

4 Francis Enejo Idachaba / Procedia Engineering 78 (2014)

5 100 Francis Enejo Idachaba / Procedia Engineering 78 ( 2014 ) The algorithm also checks to see the frequency of the recipient mobile in that location. If it has been there before, then this condition compared with all the previous conditions have to be met before the messages are delivered but if it is not registered or if it doesn t have a history of delivered messaged or if it is its first time in that location, the message is delayed and analyzed. The Algorithm checks can be run on any mobile that enters any of the critical areas such that suspicious mobiles are tagged before any SMS is sent to them. Thus mobiles that can receive SMS will be known before the SMS comes and suspicious mobiles phones will not receive any SMS sent to them. This ensures that the Algorithm has no impact on message delivery time. The location of the tagged mobiles can be sent to security forces if the mobiles are found to be stationary beyond the normal operating time of the work area or before the commencement of a major activity within the critical area. It is mandatory in most countries for all mobile numbers to be registered with their operators as such SMS sent to any unregistered mobile phone/ number in the critical area will not be delivered 4.1. Flowchart The flowchart for the Source Mobile identification and attack prevention algorithm is shown in Figure 7. Incoming SMS Message Check SMS Destination mobile location Is Mobile in the critical area? Deliver SMS YES Is Mobile Registered? Investigate SMS Discard YES Deliver SMS YES Has Mobile got message or YES call or sent any in the last one hour before entering the critical area? Has Mobile Got message / call history? Has Mobile been stationary for > 8 hours? YES Delay delivery until mobile leave the critical area Deliver SMS Delay delivery until peak period of activity is past Fig. 7. Flowchart for the Algorithm 4.2. Algorithm for Source Mobile identification In the event of an SMS triggered explosion, the following algorithm can be used to narrow down and eventually identify the source of the trigger:

6 Francis Enejo Idachaba / Procedia Engineering 78 ( 2014 ) Isolate all the SMS received by mobiles in the area of the attack 2. Check all the sources of the SMS 3. Check the message history of all the recipient mobile numbers and isolate the mobile without prior receipt or transmitted messages 4. Identify the mobile number that doesn t come on after the attack, it is most likely the trigger module. 5. Identify the source mobiles that communicated with that sent the last SMS to the trigger mobile number and narrow the mobile down to the most frequent registered number on its call log. 6. If the source mobile is an unregistered mobile (and has been probably disposed) track the call logs of that mobile and the cell from where the cell was when the SMS was generated. Video camera feed of the area can be reviewed if they exist. 7. Check all the mobiles that communicated with the source mobile and create a record of the call frequency and duration. The registered mobile can be checked and the identified owners of those mobile can be handed over to the security agencies for further investigative action 5. Conclusion In the fight against terrorism, there is a constant need to be ahead of the perpetuators of these acts. This work provides an opportunity for governments to take preemptive steps against the period when the terrorists would begin to appreciate the opportunities provided by the use of the GSM platform for the transmission of IED trigger signals. These algorithms will require no change in the network configuration and will introduce minimal impact to the speed of message delivery. The algorithms also provide a means of identifying suspicious GSM modems and SMS trigger enabled IED before the messages are sent. The Early detection of the SMS enabled IEDs will result in a minimization of detonations while ensuring protection of both lives and critical infrastructure. References [1] Digital cellular telecommunications system (Phase 2+); Circuit switched voice capacity evolution for GSM/EDGE Radio Access Network (GERAN) (3GPP TR version Release 11) ETSI TR V ( ) ETSI [2] CDMA450 market facts. Dec 2013 [3] CDMA2000 Market Trends and facts. December 2013 [4] A.M Zungeru, U.V Edu and A.J Garba. Design and Implementation of Short Message Service based Remote Controller. Computer Engineering and Intelligent systems Vol3 No [5] B. Ramamurthy, S.Bhargavi, R. Shashikumar. Development of a low cost GSM SMS-based humidity Remote Monitoring and Control system for Industrial Application. International Journal of Advanced Computer Science and Application. Vol 1 No [6] A.J Al-Mghawish. A practical approach for mobile based remote control. European Scientific Journal June 2013 [7] M.Xu and J.Du. Design of SMS-based remote control system using TC35 and MCU. International Conference on Internet Computing and Information services Hong Kong 2011 [8] V.M Ibrahim, A.A Victor and S.Y Musa. GSM based Anti-theft Security system using AT&T Command. International Journal of Computational Engineering Research. Vol2 Issue [9] V.Covello, S.Becker, M.Palernchar, Q. Renn and P.Selke. Effective Risk Communication for the Counter Improvised Explosive Devices Threat. Vol 1 US Department of Home land Security Dec 2010 [10] Countering Improvised Explosive Devises. Office of the President of the United States of America Feb 2013 [11] Multi Jurisdiction IED Security Planning guide. US Department of Homeland Security. May 2008 [12] C.W Johnson. A systematic approach for countering the threat to public safety from Improvised Explosive Devices. [13] G.D Stevens. Whole of Government Approach to countering Domestic IEDs: Leveraging Military Capabilities. Institute for National Security and Counter Terrorism Syracuse University 2012 [14] K.Wilgucki, R.Urban, G. Baranowski, P.Gradzki, P.Skarzynski. Automated Protection Systems. Military Communications Institute Poland [15] C.Kopp. Defeating Improvised Explosive Devices. Defense Today Sept [16] Remotely Initiated IEDs: GSM Phones and Beyond. Scoping paper. Survey of RCIEDs South East Asia. Feb 2003-Oct OSS.net

Basics of GSM in depth

Basics of GSM in depth This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets

More information

Cellular Communication

Cellular Communication Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).

More information

VEHICLE THEFT DETECTION BY GSM D.Gurunath 1, Dr. Sreeja Mole S S 2, Rekha 3 1

VEHICLE THEFT DETECTION BY GSM D.Gurunath 1, Dr. Sreeja Mole S S 2, Rekha 3 1 VEHICLE THEFT DETECTION BY GSM D.Gurunath 1, Dr. Sreeja Mole S S 2, Rekha 3 1 Assistant Professor, CJITS, Janangon 2 Professor/HOD, Department of ECE, CJITS, Janagon. 3 CJITS, Janagon Abstract Nowadays,

More information

Short Message Service (SMS)

Short Message Service (SMS) TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages

More information

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )

E2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: ) E2-E3: CONSUMER MOBILITY CHAPTER-5 CDMA 2000 1x OVERVIEW (Date of Creation: 01-04.2011) Page: 1 CDMA 2000 1X Overview Introduction CDMA (code division multiple access) is a mobile digital radio technology

More information

Insights Into the SMS Industry and Market Trends

Insights Into the SMS Industry and Market Trends Insights Into the SMS Industry and Market Trends Stewart A. Skomra Director Business Development Qualcomm Enterprise Services E-Mail: sskomra@qualcomm.com Mobile: 858-740-4643 February 29, 2008 Wireless

More information

Understanding Carrier Wireless Systems

Understanding Carrier Wireless Systems Understanding Course Description This course provides a detailed scope of modern mobile and cellular network technologies used for second generation, 2G+, 3G and 4G networks. It provides an understanding

More information

EUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD

EUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD EUROPEAN ETS 300 522 TELECOMMUNICATION November 1996 STANDARD Third Edition Source: ETSI TC-SMG Reference: RE/SMG-030302PR2 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System

More information

GPRS and UMTS T

GPRS and UMTS T GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,

More information

Chapter 2 The 3G Mobile Communications

Chapter 2 The 3G Mobile Communications Chapter 2 The 3G Mobile Communications 2.1 The Vision for Third Generation (3G) Mobile Communication Systems: The vision for the emerging mobile and personal communication services for the new century

More information

ITU-T Q Signalling architecture and requirements for IP-based short message service over ITU-T defined NGN

ITU-T Q Signalling architecture and requirements for IP-based short message service over ITU-T defined NGN I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Q.3053 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2017) SERIES Q: SWITCHING AND SIGNALLING, AND ASSOCIATED MEASUREMENTS

More information

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013

Advanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013 Advanced Computer Networks 263-3501-00 Exercise Session 4 Qin Yin Spring Semester 2013 1 Administration If you haven't received any email about your submission We got your solutions for A1 & A2 About solutions

More information

ETSI TS V6.1.0 ( )

ETSI TS V6.1.0 ( ) TS 100 533 V6.1.0 (1999-07) Technical Specification Digital cellular telecommunications system (Phase 2+); Technical realization of Operator Determined Barring (ODB) (GSM 03.15 version 6.1.0 Release 1997)

More information

Procedia Computer Science

Procedia Computer Science Procedia Computer Science 3 (2011) 949 953 Procedia Computer Science 00 (2010) 000 000 Procedia Computer Science www.elsevier.com/locate/procedia www.elsevier.com/locate/procedia WCIT 2010 An Implementation

More information

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS

Mobile forensics. SMS (Short Message Service) EMS, MMS, CBS Mobile forensics SMS (Short Message Service) EMS, MMS, CBS How the Mobiles Work The Route of a Mobile Phone Telephone Call, (or SMS or user data traffic) SIM card Radio access network Core network MS/UE

More information

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology

Rab Nawaz Jadoon. Cellular Systems - II DCS. Assistant Professor. Department of Computer Science. COMSATS Institute of Information Technology Cellular Systems - II Rab Nawaz Jadoon DCS Assistant Professor COMSATS IIT, Abbottabad Pakistan COMSATS Institute of Information Technology Mobile Communication UMTS Architecture A UMTS network consist

More information

JP-3GA (R99) Technical realisation of Operator Determined Barring (ODB)

JP-3GA (R99) Technical realisation of Operator Determined Barring (ODB) JP-3GA-23.015(R99) Technical realisation of Operator Determined Barring (ODB) Version 1 Mar 31, 2000 THE TELECOMMUNICATION TECHNOLOGY COMMITTEE JP-3GA-23.015(R99) Technical realization of Operator Determined

More information

Pertemuan 7 GSM Network. DAHLAN ABDULLAH

Pertemuan 7 GSM Network. DAHLAN ABDULLAH Pertemuan 7 GSM Network DAHLAN ABDULLAH Email : dahlan.unimal@gmail.com Contents GSM-Introduction Architecture Technical Specification & Operation Frame Structure Channels Call Routing Security Characteristics

More information

Signaling System 7 (SS7) By : Ali Mustafa

Signaling System 7 (SS7) By : Ali Mustafa Signaling System 7 (SS7) By : Ali Mustafa Contents Types of Signaling SS7 Signaling SS7 Protocol Architecture SS7 Network Architecture Basic Call Setup SS7 Applications SS7/IP Inter-working VoIP Network

More information

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper

Nexus8610 Traffic Simulation System. Intersystem Handover Simulation. White Paper Traffic Simulation System Intersystem Handover Simulation White Paper Notice Every effort has been made to ensure that the information in this document was accurate at the time of printing. However, the

More information

A Methodology in Mobile Networks for Global Roaming

A Methodology in Mobile Networks for Global Roaming ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Method and Device to Communicate via SMS After a Security Intrusion

Method and Device to Communicate via SMS After a Security Intrusion Abstract Method and Device to Communicate via SMS After a Security Intrusion Vishy Karri 1, Daniel J.S. Lim 2 School of Engineering, University of Tasmania Hobart, Australia Vishy.Karri@utas.edu.au & jsdlim@utas.edu.au

More information

Personal Handyphone Systems in Urban Infrastructure

Personal Handyphone Systems in Urban Infrastructure Personal Handyphone Systems in Urban Infrastructure Yukio Iino Mitsunobu Ootsuka Isao Shimbo ABSTRACT: The personal handyphone system (PHS) service began in Japan in 1995. As this new communication service

More information

Alcatel-Lucent 1357 ULIS

Alcatel-Lucent 1357 ULIS Unified Lawful Interception Suite The adds lawful interception functions to Alcatel-Lucent products, adapting their internal interfaces to the standard lawful interception interfaces of law enforcement

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN 7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of

More information

Addressing Current and Future Wireless Demand

Addressing Current and Future Wireless Demand Addressing Current and Future Wireless Demand Dave Wolter Executive Director Radio Technology AT&T Architecture and Planning Rising Demand and The Need to Innovate in the Network 6,732% growth over 13

More information

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003

TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003 Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003

More information

INDUSTRY GROUP. GSM-R Core Evolution. Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom. 1

INDUSTRY GROUP. GSM-R Core Evolution. Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom.  1 GSM-R Core Evolution Jean-Michel Evanghelou Head of Railways Solutions Kapsch CarrierCom 1 Strategy Trend : Evolve GSM-R from TDM to IP Fully Secured Networks R99 to R4 evolution : Packetization of Voice

More information

Mobile Security / /

Mobile Security / / Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 14 Sept 2010 Class #7 Securing Cellular Services Agenda Vulnerabilities in Cellular Services SMS and related attacks Cellular data services and attacks

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV006-227, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Friday: 3 pm 5 pm Time: Friday, 17h45-20h15 Room

More information

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks

Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks Talk 4: WLAN-GPRS Integration for Next-Generation Mobile Data Networks IEEE Wireless Communication, Oct. 2002 Presented by Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering

More information

International Journal of Scientific & Engineering Research, Volume 5, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 5, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volume 5, Issue 10, October-2014 535 MINIMIZATION OF CALL DROP IN CODE DIVISION MULTIPLE ACCESS 2000IX IN 3G WIRELESS NETWORKS Udeh I.J, Offia

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

Avoidance of Bottleneck in PCS Network

Avoidance of Bottleneck in PCS Network Avoidance of Bottleneck in PCS Network Sidhi Pandey 1, Alka 2, Pratima Singh 3 1, 2, 3 (Computer Science & Engineering, Institute of Technology & Management, India) Abstract: This paper contains the concept

More information

WIRELESS SYSTEM AND NETWORKING

WIRELESS SYSTEM AND NETWORKING LECTURE 6 WIRELESS SYSTEM AND NETWORKING References: Rappaport (Chapter 9 and 10) Bernhard (Chapter 3, 4 and 5) Garg (Chapter 8 and 9) Kaarenen (Chapter 1-5 and 9) WIRELESS EVOLUTION Japan Europe Americas

More information

Technical description of international mobile roaming May 2010

Technical description of international mobile roaming May 2010 Technical description of international mobile roaming May 2010 Prepared by the Ministry of Economic Development of New Zealand and the Department of Broadband, Communications and the Digital Economy of

More information

Kapsch CarrierCom. Challenging limits

Kapsch CarrierCom. Challenging limits Kapsch CarrierCom Challenging limits The Kapsch Group Challenging Limits globally Four independently operating key entities: Kapsch TrafficCom Kapsch CarrierCom Kapsch BusinessCom Kapsch PublicTransportCom

More information

Chapter 3 GSM and Similar Architectures

Chapter 3 GSM and Similar Architectures CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols

More information

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.

10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS

More information

MNPTF PT2. NPM2V1F 17 july Mobile Number Portability Task Force : PT2 : Network Architecture and Signalling

MNPTF PT2. NPM2V1F 17 july Mobile Number Portability Task Force : PT2 : Network Architecture and Signalling NPM2V1F 17 july 2001 Mobile Number Portability Task Force : PT2 : Network Architecture and Signalling HISTORY Date Version Evolution 27/02/2001 V11 Creation of draft version 16/03/2001 V20 Update of draft

More information

Publication of specifications for the mobile network interfaces offered by Wind

Publication of specifications for the mobile network interfaces offered by Wind interfaces offered by Wind Page 1/10 Publication of specifications for the mobile network interfaces offered by Wind interfaces offered by Wind Page 2/10 TABLE OF CONTENTS 1. INTRODUCTION 3 2. SCOPE...

More information

The challenges, opportunities and setting the framework for 5G EMF and Health

The challenges, opportunities and setting the framework for 5G EMF and Health The challenges, opportunities and setting the framework for 5G EMF and Health 5G, EMF & Health 5 December 2017, Warsaw, Poland Mike Wood - General Manager Telstra EME Strategy, Governance and Risk Management

More information

GSM System Overview. Ph.D. Phone Lin.

GSM System Overview. Ph.D. Phone Lin. GSM System Overview Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Architecture Location Tracking and Call Setup Security GSM Data Services Unstructured Supplementary Service Data

More information

4G Mobile Communications

4G Mobile Communications 4G Mobile Communications Welcome to 4G The term 4G is used broadly to include several types of broadband wireless access communication systems, not only cellular telephone systems. One of the terms to

More information

ETSI TR V1.1.1 ( )

ETSI TR V1.1.1 ( ) TR 102 314-3 V1.1.1 (2005-03) Technical Report Fixed network Multimedia Messaging Service (F-MMS); PSTN/ISDN; Part 3: Network architecture and interconnection 2 TR 102 314-3 V1.1.1 (2005-03) Reference

More information

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks

Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations. Mobile Telephony Networks Dimensioning, configuration and deployment of Radio Access Networks. part 1: General considerations Mobile Telephony Networks 1 The Evolution of Mobile Telephony 1st Generation 2nd 3rd 4th Analogue Voice

More information

Hands-On Modern Mobile and Long Term Evolution LTE

Hands-On Modern Mobile and Long Term Evolution LTE Hands-On LTE Course Description With 3G mobile technologies already rolled out by over 200 operators in over 80 countries, standards bodies, manufacturers and operators are looking towards the next generation

More information

Telecommunication Services Engineering Lab

Telecommunication Services Engineering Lab Logistics Instructor Office: EV007-647, Tel: 1-514-8482424 ext 5846, Email: Glitho@ciiseconcordiaca URL: http://wwwececoncordiaca/~glitho/ Office hours: Tuesday: 3 pm 5 pm Time: Usually: Tuesday, 17h45-20h15

More information

E1-E2 UPGRADATION COURSE CONSUMER MOBILITY. 3G Concept

E1-E2 UPGRADATION COURSE CONSUMER MOBILITY. 3G Concept E1-E2 UPGRADATION COURSE CONSUMER MOBILITY 3G Concept Page 1 CHAPTER-TWO 3 G CONCEPT UMTS and the information society Rapid advancements in Information and Communications Technology (ICT) have already

More information

Media Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless Ad hoc Network

Media Access Delay and Throughput Analysis of Voice Codec with Silence Suppression on Wireless Ad hoc Network Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 79 (2016 ) 940 947 7th International Conference on Communication, Computing and Virtualization 2016 Media Access Delay

More information

Available online at ScienceDirect. Procedia Computer Science 57 (2015 )

Available online at   ScienceDirect. Procedia Computer Science 57 (2015 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 57 (2015 ) 890 897 2015 International Conference on Recent Trends in Computing (ICRTC 2015) Performance Analysis of Efficient

More information

CONNECTIVITY THROUGH BACKHAUL

CONNECTIVITY THROUGH BACKHAUL Supported by www.gscoalition.org CONNECTIVITY THROUGH BACKHAUL The Critical Role of Satellite Services in Supporting Mobile Connectivity Through Backhaul. The importance of mobile connectivity cannot be

More information

CONNECTIVITY THROUGH BACKHAUL

CONNECTIVITY THROUGH BACKHAUL The Critical Role of Satellite Services in Supporting Mobile Connectivity Through Backhaul. The importance of mobile connectivity cannot be overstated in today s world, whether for the most developed economies

More information

ETSI TS V4.5.0 ( )

ETSI TS V4.5.0 ( ) TS 122 078 V4.5.0 (2002-03) Technical Specification Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); Customized Applications for Mobile network

More information

Information Technology Mobile Computing Module: GSM Handovers

Information Technology Mobile Computing Module: GSM Handovers Information Technology Mobile Computing Module: GSM Handovers Learning Objectives What is handover? Why handover are required? Types of handovers(hard and Soft) Types of Handovers in GSM(Intra cell, Inter

More information

Voice over Long Term Evolution Migration Strategies

Voice over Long Term Evolution Migration Strategies White Paper Voice over Long Term Evolution Migration Strategies What You Will Learn The evolution of mobile networks to the Voice over Long Term Evolution (VoLTE) all-ip technology standard has generated

More information

Mobile Security Fall 2013

Mobile Security Fall 2013 Mobile Security 14-829 Fall 2013 Patrick Tague Class #4 Telecom System Security General Vulnerabilities Service interruption vulnerabilities Due to increased capacity offered by high speed communication

More information

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only

E3-E4 (CM MODULE) CDMA x & EV-DO. For internal circulation of BSNL only E3-E4 (CM MODULE) CDMA 2000 1x & EV-DO WELCOME This is a presentation for the E3-E4 Technical (CM- Module)fortheTopic:CDMA20001x&EV-DO Eligibility: Those who have got the upgradation frome3toe4. This presentation

More information

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture

Cellular Mobile Systems and Services (TCOM1010) GSM Architecture GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 103 418 V1.1.1 (2017-02) TECHNICAL SPECIFICATION Railway Telecommunications (RT); SMS to Railway numbering plan in roaming environment 2 TS 103 418 V1.1.1 (2017-02) Reference DTS/RT-0042 Keywords GSM-R,

More information

INTERNET BASED FLEET MANAGEMENT USING GPS AND GSM/GPRS

INTERNET BASED FLEET MANAGEMENT USING GPS AND GSM/GPRS INTERNET BASED FLEET MANAGEMENT USING GPS AND GSM/GPRS Item Type text; Proceedings Authors Cangzhou, Yuan; Qishan, Zhang; Zhongkan, Liu Publisher International Foundation for Telemetering Journal International

More information

Internal. GSM Fundamentals.

Internal. GSM Fundamentals. Internal GSM Fundamentals www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Chapter 1 GSM System Overview Chapter 2 GSM Network Structure Chapter 3 Service Area and Number Planning Chapter

More information

ScienceDirect. Advanced Object Monitoring Using Wireless Sensors Network

ScienceDirect. Advanced Object Monitoring Using Wireless Sensors Network Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 65 (2015 ) 17 24 International Conference on Communication, Management and Information Technology (ICCMIT 2015) Advanced

More information

Text Insertion in Short Message Delivery Report for CDMA Network

Text Insertion in Short Message Delivery Report for CDMA Network Vol. 5/No. 2 B (2013) INTERNETWORKING INDONESIA JOURNAL 15 in Short Message Report for CDMA Network Rakhman Imansyah, Andri Qiantori and Wiseto Agung Research and Development Center, TELKOM Bandung, Indonesia

More information

Chapter 2. Literature Survey. 2.1 Remote access technologies

Chapter 2. Literature Survey. 2.1 Remote access technologies Chapter 2 Literature Survey This chapter presents a brief report on literature reviewed in context to present work with an aim to identify current state of research in the domain. Literature review is

More information

Advanced Intelligent Network for Wireless Communications

Advanced Intelligent Network for Wireless Communications www..org Advanced Intelligent Network for Wireless Communications 6 Pooja Sharma 1 Pawan Bhadana 2 1 B.S.Anangpuria Institute of Technology and Management, Faridabad, Haryana, India Poojasharma161@gmail.com

More information

Optimising 3G Migration

Optimising 3G Migration Optimising 3G Migration Sub-Regional Seminar on IMT-2000 Warsow,, 2-42 4 October 2001 Marie FROMENT Marketing Manager Alcatel Mobile Network Division marie.froment@alcatel.fr Optimising 3G Migration Outline

More information

Wireless Communication

Wireless Communication Wireless Communication Hwajung Lee Key Reference: Prof. Jong-Moon Chung s Lecture Notes at Yonsei University Wireless Communications Bluetooth Wi-Fi Mobile Communications LTE LTE-Advanced Mobile Communications

More information

SCADA Systems Management based on WEB Services

SCADA Systems Management based on WEB Services Available online at www.sciencedirect.com ScienceDirect Procedia Economics and Finance 32 ( 2015 ) 464 470 Emerging Markets Queries in Finance and Business SCADA Systems Management based on WEB Services

More information

Signaling Protocol Encoding and Simulation for Third Generation CDMA Network Air-Interface

Signaling Protocol Encoding and Simulation for Third Generation CDMA Network Air-Interface 16 th International Conference on AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT - 16 May 26-28, 2015, E-Mail: asat@mtc.edu.eg Military Technical College, Kobry Elkobbah, Cairo, Egypt Tel : +(202) 24025292

More information

Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000

Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000 Mobile Networks Evolution: Economic Aspects of Evolution towards IMT2000 ITU-BDT Regional Seminar on Fixed Mobile Convergence and new network architecture for Arab Region Tunis, Tunisia, 21-24 November

More information

Wireless Security Background

Wireless Security Background Wireless Security Background Wireless Networks The need for mobile computing Laptops, PDAs, Bluetooth devices Smart phones Enabling technology Wireless communication Two important characteristics Wireless

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

United States Patent (19) Boltz et al.

United States Patent (19) Boltz et al. United States Patent (19) Boltz et al. 54 SYSTEM AND METHOD FOR TIME DEFINED DELIVERY OF SHORT MESSAGE SERVICE MESSAGES 75 Inventors: David Boltz; David B. Westbrook, both of Garland, TeX. 73 Assignee:

More information

Mobile Security / /

Mobile Security / / Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 2 Sept 2010 Class #4 Overview of Mobile/Cellular Systems Agenda Overview of mobile cellular systems System architecture and overview 2G, 2.5G, 2.75G,

More information

2009/TEL39/DSG-LSG/WKSP/010rev2 Affordable Universal Access to Broadband Using the Mainstream Mobile Technologies

2009/TEL39/DSG-LSG/WKSP/010rev2 Affordable Universal Access to Broadband Using the Mainstream Mobile Technologies 2009/TEL39/DSG-LSG/WKSP/010rev2 Affordable Universal Access to Broadband Using the Mainstream Mobile Technologies Submitted by: Ericsson Workshop on Universal Access to Broadband Services Singapore 13

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

Experimental Analysis of the Femtocell Location Verification Techniques

Experimental Analysis of the Femtocell Location Verification Techniques Experimental Analysis of the Femtocell Location Verification Techniques Ravishankar Borgaonkar, Kevin Redon and Jean-Pierre Seifert Security in Telecommunication Technical University Berlin and Deutsche

More information

UMUDIKE JOURNAL OF ENGINEERING AND TECHNOLOGY (UJET) VOL. 1, NO. 2, DECEMBER 2015 PAGE 61-66

UMUDIKE JOURNAL OF ENGINEERING AND TECHNOLOGY (UJET) VOL. 1, NO. 2, DECEMBER 2015 PAGE 61-66 UMUDIKE JOURNAL OF ENGINEERING AND TECHNOLOGY (UJET) VOL. 1, NO. 2, DECEMBER 2015 PAGE 61-66 PERFORMANCE EVALUATION OF QUALITY OF SERVICE OF CDMA20001X MOBILE RADIO NETWORK *Ifeagwu, E N., Obi, P.I. and

More information

Communication Systems for the Mobile Information Society

Communication Systems for the Mobile Information Society Communication Systems for the Mobile Information Society Martin Sauter Nortel Networks, Germany John Wiley Si Sons, Ltd Contents Preface List of Figures List of Tables List of Abbreviations xi xiii xix

More information

Design of Intel 8751 Microcontroller-based System for Monitoring and Control of a Thermal Process

Design of Intel 8751 Microcontroller-based System for Monitoring and Control of a Thermal Process Design of Intel 8751 Microcontroller-based System for Monitoring and Control of a Thermal Process Francis Enejo Idachaba Department of Electrical and Information Engineering, College of Science and Technology,

More information

28 Deploying IN Services in a Mobile Environment

28 Deploying IN Services in a Mobile Environment 28 Deploying IN Services in a Mobile Environment D. Haran Comverse Network Systems 170 Crossways Park Drive, Woodbury, New York 11797 USA Tel: (516) 677-7200, Fax: (516) 677-7355 E-mail danny_haran@comverse.com

More information

PCS (GSM) 1900 Service Provider Number Portability

PCS (GSM) 1900 Service Provider Number Portability ETSI SMG Plenary Tdoc SMG 661 / 97 Budapest, 13-17 October 1997 Agenda Item: 7.1 Source: SMG1 R GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS PCS (GSM) 1900 Service Provider Number Portability ANSI This specification

More information

Convergent Offers and NGN

Convergent Offers and NGN Convergent Offers and NGN BAKOM/OFCOM Workshop 5 th September 2006 1 Network convergence and customer expectations What is convergence? Mobile and fixed networks get together This development is coming

More information

Standardization Trend for Super 3G (LTE)

Standardization Trend for Super 3G (LTE) : NGN Mobile Communication Technologies for Standardization Trend for Super (LTE) Sadayuki Abeta and Minami Ishii Abstract Super (also known as Long Term Evolution (LTE)) expands upon the HSDPA/HSUPA (high-speed

More information

ETSI ETR 109 TECHNICAL October 1993 REPORT

ETSI ETR 109 TECHNICAL October 1993 REPORT ETSI ETR 109 TECHNICAL October 1993 REPORT Source: ETSI TC-SMG Reference: GSM 09.01 ICS: 33.060.30 Key words: European digital cellular telecommunications system, Global System for Mobile communications

More information

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status

COPYRIGHTED MATERIAL. Introduction. Harri Holma and Antti Toskala. 1.1 WCDMA technology and deployment status 1 Introduction Harri Holma and Antti Toskala 1.1 WCDMA technology and deployment status The first Third Generation Partnership Project (3GPP) Wideband Code Division Multiple Access (WCDMA) networks were

More information

Wireless and Mobile Network Architecture

Wireless and Mobile Network Architecture Wireless and Mobile Network Architecture Chapter 8: GSM Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline

More information

PERSONAL communications service (PCS) provides

PERSONAL communications service (PCS) provides 646 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 5, NO. 5, OCTOBER 1997 Dynamic Hierarchical Database Architecture for Location Management in PCS Networks Joseph S. M. Ho, Member, IEEE, and Ian F. Akyildiz,

More information

Trends in Lawful Interception and Its Applications in National Security

Trends in Lawful Interception and Its Applications in National Security Vol.1 No. 2, 95-99 (2012) Received Aug.2012; Accepted Nov.2012 Trends in Lawful Interception and Its Applications in National Security Abstract Namita Saxena and Mansi Singh Electronics and Communication

More information

Dr. Evaldas Stankevičius, Regulatory and Security Expert.

Dr. Evaldas Stankevičius, Regulatory and Security Expert. 2018-08-23 Dr. Evaldas Stankevičius, Regulatory and Security Expert Email: evaldas.stankevicius@tele2.com 1G: purely analog system. 2G: voice and SMS. 3G: packet switching communication. 4G: enhanced mobile

More information

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department

GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department Appendix - F GOPALAN COLLEGE OF ENGINEERING AND MANAGEMENT Electronics and communication Department Academic Year: 2016-17 Semester: EVEN 6. COURSE PLAN Semester: VI Subject Code: 10EC81 Name of Subject:

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

Available online at ScienceDirect. Procedia Computer Science 34 (2014 )

Available online at   ScienceDirect. Procedia Computer Science 34 (2014 ) Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 680 685 International Workshop on Software Defined Networks for a New Generation of Applications and Services

More information

GSM and Mobile Telephony Trends

GSM and Mobile Telephony Trends Review Article AJTL 2018,1:4 American Journal of Transportation and Logistics (DOI:10.28933/AJTL) GSM and Mobile Telephony Trends Damilola Fowora*, Oludele Awodele, Olakunle Olayinka and Oyebode Aduragbemi

More information

A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK

A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK International Journal of Computer Science and Communication Vol. 2, No. 1, January-June 2011, pp. 63 67 A NEW ALGORITHM FOR CALL SETUP FROM A FIXED WIRELINE TO A ROAMING MOBILE STATION IN AN ADJACENT NETWORK

More information

Mobile Security Fall 2012

Mobile Security Fall 2012 Mobile Security 14-829 Fall 2012 Patrick Tague Class #5 Telecom Infrastructure Attacks Announcements Project teams and topics need to be set soon Project topics must be approved before the proposal can

More information

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management Remarks of Marcus Sachs, Senior Vice President and the Chief Security Officer North American Electric Reliability

More information

GSM GSM TECHNICAL November 1996 SPECIFICATION Version 5.1.0

GSM GSM TECHNICAL November 1996 SPECIFICATION Version 5.1.0 GSM GSM 02.78 TECHNICAL November 1996 SPECIFICATION Version 5.1.0 Source: ETSI TC-SMG Reference: TS/SMG-010278QR ICS: 33.020 Key words: Digital cellular telecommunications system, Global System for Mobile

More information

Final draft ETSI ES V1.1.1 ( )

Final draft ETSI ES V1.1.1 ( ) Final draft ES 202 060-2 V1.1.1 (2003-03) Standard Short Message Service (SMS) for fixed networks; Network Based Solution (NBS); Part 2: Architecture and functional entities 2 Final draft ES 202 060-2

More information